Skip to content
Menu
Open World News Open World News
  • Privacy Policy
Open World News Open World News

Category: News

Third Audit Results

Posted on December 29, 2022 by Michael G

We received an audit on the new “index-v2” work in official Android client
app + API (3 days) and the new front end webserver setup (1 day). There
were no findings for the webserver setup, so the analysis in this post deals
with the F-Droid client app. The audit was conducted by Radically Open
Security
, which is a natural partner
for F-Droid since they share a focus on free software and open processes.
Thanks to NLnet for finding the auditor and covering the
costs of hiring them. We are making the original report available for
download.

This post was written in the spirit of transparency with technical detail
about the risks of each vulnerability. We welcome further scrutiny. For
more information about F-Droid’s security practices, see the documentation
about the Security Model.

CLN-002 – XML parsers might be vulnerable to XXE attacks

  • Vulnerability type: Input validation
  • Threat level: Elevated

The application’s XML parser implementation might be vulnerable to XML
External Entity (XXE) attacks.

Impact

If the XML parser has no restrictions for external and internal entities,
then this might lead to arbitrary file disclosures or server-side request
forgery (SSRF) vulnerabilities when XML input is parsed.

Our Response

The original index file, the version 0 format, is an XML file generated as
part of any repo. It is available at either index.xml or the more recent
signed version at index.jar. Recent versions of the client will always
try index-v1.jar first, which is a signed JSON format. If that is not
available, the client will fallback to index.jar. index.jar is also
used for the “nearby” app swapping functionality. All of these index.jar
files must pass the signature verification before the XML is parsed.

Successful exploitation of this would require either a) the attacker was
able to get the target to add a malicious repo, or b) the attacker was able
to get the repo signing keys and then break into an existing repo’s server
and replace the index files. For example, a malicious actor could try to
exploit someone via Nearby app swapping, so only get apps from people you
trust. The way that the client is set up to parse the XML was vulnerable,
and would allow a successful attacker to read files that the F-Droid app can
read

For f-droid.org and the Guardian Project repo, the index files are
monitored, and changes to them are logged. So we can say with high
confidence that index-v1.jar was never removed, which is a prerequisite
for exploiting this vulnerability.

F-Droid client v1.15.4 disables all support for XML External Entities. The
v1.16-alpha0 no longer supports XML indexes at all, and all code related to
the XML index parsing and generation was removed. We will also be working
on improving the security of adding repos as part of the FFDW-DVD
funding.

CLN-005 – Vulnerable TLS versions accepted

  • Vulnerability type: Insecure configuration
  • Threat level: Elevated

The backend domains used by the application accept obsolete TLS 1.0 and TLS
1.1 protocols.

Impact

Use of TLS 1.0 and 1.1 make the communication susceptible to downgrade
attacks, as they work on SHA-1 hash for the integrity of exchanged
messages. The handshake authentication is also done on SHA-1, which makes it
easier for an attacker to impersonate a server for MITM attacks. The PCI DSS
(Payment Card Industry Data Security Standard) specifies that TLS 1.0 may no
longer be used as of June 30, 2018, and also strongly recommends disabling
1.1, so this may impact compliance with regulations.

Our Response

F-Droid places a high importance on maintaining compatibility as long as
possible. This is why we leave TLS 1.0 and TLS 1.1 enabled on our
websites. We believe there is no added risk for people who keep their
software updated. The F-Droid Client app does not allow TLS 1.1 or 1.0
connections. TLS 1.3 provides good downgrade protection, TLS 1.2 less. Any
reputable TLS implementation from the past years make it quite difficult to
force a connection to use TLS 1.0 or 1.1. Recent browser
releases

are entirely removing support for TLS 1.0 and 1.1 anyway. That means that
any browser or client version that connects over TLS 1.0 or 1.1 actually
needs that to function. A device running Android 1.6 should be able to
install an old version of F-Droid, and have a working app store.

If you are on a device that still needs to use TLS 1.0 or 1.1, then there
are already so many well known security vulnerabilities that this one is not
particularly interesting. If you would like to test whether your browser
still supports TLS 1.0 or 1.1, click on the links below and see if they give
you an error message.

  • https://tls-v1-0.badssl.com:1010/
  • https://tls-v1-1.badssl.com:1011/

CLN-001 – Encryption algorithms using insecure mode and padding scheme

  • Vulnerability type: Weak Cryptography
  • Threat level: Low

The encryption algorithms used in the app use an insecure mode and padding
scheme.

Impact

If sensitive data is being encrypted using an insecure mode and padding, it
might lead to data being stolen or recovered from the encrypted data.

Our Response

This was only ever used to sign the app index file used in the Nearby app
swapping, which only works over the local network. The signature is on a
short-lived file that is generated on the fly, and is almost always used in
a one-to-one interaction. A lot of other pieces would have to be in place
for this to be exploited. Plus it would require a fair amount of expense to
crack the cryptography on the file that was signed seconds or minutes
before, and probably will only be in use for around 10 minutes. Any app
updates received via Nearby swapping will still have the full protection of
the APK signature. For these reasons, it is also still safe to use the SHA1
algorithm, which is necessary here for compatibility. This use case falls
under the “second preimage
attack
”
case, meaning that the attacker cannot affect the data before it is
signed. Git can also still rely on SHA1 for this reason.

F-Droid client v1.15.4 and v1.16-alpha1 switched from RSA/ECB/PKCS1Padding
to the standard SHA1withRSA algorithm for signing the Nearby index.jar.
The new “index-v2” for repositories added in v1.16-alpha0 uses
SHA256withRSA as the signing algorithm. The official client always starts
by trying the latest index version in each repository, and v1.16 added
downgrade protection so a repo that already offers index-v2 can’t be
downgraded to index-v1.

CLN-003 – Clear text traffic is enabled in the application

  • Vulnerability type: Insecure configuration
  • Threat level: Low

The base network config of the application allows clear-text traffic.

Impact

Allowing clear-text traffic impacts confidentiality, authenticity, and
protection against tampering. An attacker performing a machine-in-the-middle
attack can eavesdrop on transmitted data and modify it without being
detected.

Our Response

This Android feature for blocking clear text HTTP connections is a good
feature that apps should use. Having this disabled is obviously not ideal,
but it is something we had to do to support the local HTTP swap
functionality, and also HTTP .onion addresses in the past (there is another
workaround possible these days). So we have taken extra measures to enforce
HTTPS:

  • All built-in repository URLs are hardcoded to
    HTTPS

  • Popular cloud hosting for repos is forced to
    HTTPS

  • The default user prompt for adding repos includes
    https://

This vulnerability applies to the exact same context as CLN-001: Nearby app
swapping. So it is already a quite limited environment for malicious actors
to operate in. This does not affect built-in repos at all, since they are
hard-coded to HTTPS. Plus good webserver setups like f-droid.org do not
allow data to be sent over plain HTTP.

CLN-004 – HTTP Request URLs are logged

  • Vulnerability type: Information leakage
  • Threat level: Low

The Android app (org.fdroid.fdroid.debug
ver. 1.14-alpha3-505-gc8514adb9-debug) logs URLs.

Impact

Logging sensitive information in the Android log is not a recommended
practice as this information can (in some scenarios) be accessed by other
applications on the same device. URLs can contain tokens or other sensitive
data which might be logged, leading to the disclosure of that data to other
apps.

Our Response

Privacy is important, and we want to ensure that any potentially private
information is not leaked, even at the cost of easier debugging or service
analytics. So we appreciate the auditor’s level of attention in reporting
this issue and have removed the URLs from the logging on release builds.

This vulnerability does not affect the security of operations. Many web
services put private tokens in URLs, and logging those would be like leaking
clear text passwords. All the well known repositories including f-droid.org
are run as a static website, so there are no user accounts. The issue here is
if someone got the “logcat” text, which is generally protected in Android,
and apps cannot simply read the text anymore. One potential leak scenario
would be if someone installed a sensitive app, then uninstalled it. That
app install and uninstall would be listed in the log, available if the user
was compelled to provide that log, or if the device was exploited to get
access to protected data.

This will be fixed
in the final v1.16 release.

(This work was funded by NLnet under an ongoing project known as Tracking
the Trackers
and The Search
for Ethical Apps
under the umbrella
of Guardian
Project
)

Balla Gaye 2 ak Sa Thiès guenné nagn touss bou bess, regardez la belle chorégraphie

Posted on December 28, 2022 by Michael G
▷▷ABONNEZ-VOUS ICI : https://bit.ly/2EcXtOL
Activez les NOTIFICATIONS pour ne pas manquer les prochaines vidéos
Retrouvez-nous sur https://www.SeneNews.com
Téléchargez notre App Android : http://bit.ly/2zzUxto
Téléchargez notre App sur IOS : http://apple.co/2zQjAco
Suivez nous sur Twitter : https://twitter.com/Senenews
Suivez nous sur Facebook : http://bit.ly/2zPqJJQ

Saiba como estão os preparativos para a posse de Lula

Posted on December 28, 2022 by Michael G
Os preparativos para a posse de Luiz Inácio Lula da Silva (PT) entram em fase final a quatro dias da cerimônia, que ocorre no próximo domingo (01). Ao longo da Esplanada dos Ministérios, é possível ver a estrutura do evento tomando forma. Enquanto isso, no entanto, cresce a tensão em torno da segurança do público e do próprio presidente eleito frente aos recentes episódios de violência causados por bolsonaristas insatisfeitos com o resultado das eleições. Assista ao Jornal da Manhã completo: https://youtu.be/frYUi2AU0dA

Baixe o app Panflix: https://www.panflix.com.br/

Baixe o AppNews Jovem Pan na Google Play
https://bit.ly/2KRm8OJ

Baixe o AppNews Jovem Pan na App Store
https://apple.co/3rSwBdh

Inscreva-se no nosso canal:
https://www.youtube.com/c/jovempannews

Entre no nosso site:
http://jovempan.com.br/

Facebook:
https://www.facebook.com/jovempannews

Siga no Twitter:
https://twitter.com/JovemPanNews

Instagram:
https://www.instagram.com/jovempannews/

#JovemPan
#JornalDaManhã

China opens its economy | UAE revises Golden Visa policy | Global Chit Chat | Oneindia News *News

Posted on December 28, 2022 by Michael G
China has announced that it will open its borders for International travel from January and also relaxed the Covid-19 guidelines for the passengers coming in the country. UAE has relaxed its norms for the Golden visa.

#GoldenVisa #RishiSunak #Covid19

Un poco de nomenclatura sobre componentes para ordenadores: gráficas

Posted on December 28, 2022 by Michael G
¿Que más os puedo contar? creo que todo lo que quería decir está dicho en el vídeo, en los subtítulos agregados posteriormente y en el artículo de WordPress (siii he publicado un artículo). Por cierto que en el vídeo solo quería hablar de las dos últimas generaciones de gráficas y al final terminé haciendo un repaso desde las GeForce 10 series (Pascal).

Artículo relacionado:
https://elespiritudekusanagi.wordpress.com/2022/12/27/sobre-componentes-para-ordenadores/

Vídeo placas base:
https://www.dailymotion.com/video/x88drkm

Vídeo procesadores:
https://www.dailymotion.com/video/x85qo1y

Blog:
https://elespiritudekusanagi.wordpress.com/

Canal en Telegram:
https://t.me/elespiritudekusanagi

Canal en Odysee:
https://odysee.com/@EEDK:0

Correo de contacto:
eedk@tutanota.com

Información música:
Happy Excited Intro 05 by TaigaSoundProd
Link: https://filmmusic.io/song/6946-happy-excited-intro-05
License: https://filmmusic.io/standard-license

Cocomore: Innovative e-learning goes Drupal

Posted on December 28, 2022 by Michael G
E-Learning illustration graphic

Cocomore’s first project on Opigno is soon going live.

abiparser gem – New Application Binary Inteface (ABI) Parser For Ethereum & Co.

Posted on December 28, 2022 by Michael G
Hello, I have started on a new abiparser gem that includes application binary interface (abi) parser machinery / helper for Ethereum & Co. (blockchain) contracts and started to document function signature hashes (“sighashes”) / selectors and interface (type) ids and more – all using coding examples in ye good olde plain ruby. Happy blockchaining with ruby. Are abis (application binary interfaces) the new apis (application programming interfaces)? Discuss. Cheers. Prost. PS: A first (upcoming) “real-world” usage-case is the new abidoc gem that – surprise, surprise – generates abi documentation pages from public abi (contract) specs (in json) parsed with the abiparser gem.

10 tutorials to study for RHCSA certification in 2023

Posted on December 28, 2022 by Michael G

Add the Red Hat Certified System Administrator (RHCSA) badge to your resume with the help of these study guides. Read More at Enable Sysadmin

The post 10 tutorials to study for RHCSA certification in 2023 appeared first on Linux.com.

FSF Blogs: IDAD 2022: Celebrating the freedom to share with a new advocacy video

Posted on December 28, 2022 by Michael G
For IDAD 2022, FSF staff took to the streets to ask passersby what they think about digital sharing. Read our wrapup and watch the first in a series of videos we are releasing in the coming days.

Win16 retro development

Posted on December 28, 2022 by Michael G
Several months ago I had a go at producing a high resolution 256-color driver for Windows 3.1. The effort was successful but is not yet complete. Along the way I re-learned many things I had forgotten, and learned several new ones. This blog entry is based on notes I made during development. There’s tons of lessons to re-learn when focusing on older platforms, whether as a mere user exploring or reminiscing, or as a developer trying to deal with all the constraints and limitations these old systems bring to the table. I’m glad it’s being documented, because the older these platforms get, the less we’ll remember about them.
  • Previous
  • 1
  • …
  • 674
  • 675
  • 676
  • 677
  • 678
  • 679
  • 680
  • …
  • 821
  • Next

Recent Posts

  • SmartEsq has launched an AI-powered MFN Election tool
  • Open Source email Clients
  • When and how to use benchmarking
  • How Plotly AI revolutionizes the dashboard development process
  • [TUT] LoRa & LoRaWAN – MikroTik wAP LR8 kit mit The Things Network verbinden [4K | DE]

Categories

  • Android
  • Linux
  • News
  • Open Source
©2025 Open World News | Powered by Superb Themes
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT